WARNING:
Use this tool at your own risk. Author is not responsible or liable if you damage your own system or others. Follow all local, state, federal, and international laws as it pertains to your geographic location. Do NOT use this tool maliciously as it is being released for educational purposes for use in cyber exercises or demonstrations of adversarial tools.This POST JUST FOR EDUCATION PURPOSE ONLY! how to run and remove Ransomware on BASH.

What to do on the client-side
Get target to download the file and execute or if you have have access to the system, download it directly
$ chmod 755 crypto.sh
$ ./crypto.sh &

What it does
– Downloads the public key and key file to the target
– Move DB settings into a common.php file and refer to that file in each of the scripts (One place to edit instead of numerous places)
– Loops through the system and encrypts the various files
– Deletes the key file and leaves the public key
– Prints the ransom message
– Links to web pages where the user can see an active countdown of the time that is left before key deletion

WARNING:
Use this tool at your own risk. Author is not responsible or liable if you damage your own system or others. Follow all local, state, federal, and international laws as it pertains to your geographic location. Do NOT use this tool maliciously as it is being released for educational purposes for use in cyber exercises or demonstrations of adversarial tools.